Practical - 4 Aim - Configuring A Point-to-Point GRE VPN Tunnel Topology
Practical - 4 Aim - Configuring A Point-to-Point GRE VPN Tunnel Topology
Practical - 4 Aim - Configuring A Point-to-Point GRE VPN Tunnel Topology
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway
addressing table.
Step 6: Verify connectivity.
At this point, the PCs are unable to ping each other. Each PC should be able to ping its
default gateway. The routers are able to ping the serial interfaces of the other routers
in the topology. If not, troubleshoot until you can verify connectivity.
e. Ping and trace the route across the tunnel from the EAST router to the WEST router
using the IP address of the tunnel interface.
What is the path to the WEST router from the EAST router?
With which interfaces are these IP addresses associated? Why?
f. The ping and traceroute commands should be successful. If not, troubleshoot before
continuing to the next part.
Part 3: Enable Routing over the GRE Tunnel
In Part 3, you will configure OSPF routing so that the LANs on the WEST and EAST routers
can communicate using the GRE tunnel.
After the GRE tunnel is set up, the routing protocol can be implemented. For GRE tunneling,
a network statement will include the IP network of the tunnel, instead of the network
associated with the serial interface. just like you would with other interfaces, such as Serial
and Ethernet. Remember that the ISP router is not participating in this routing process.
Step 1: Configure OSPF routing for area 0 over the tunnel.
a. Configure OSPF process ID 1 using area 0 on the WEST router for the 172.16.1.0/24 and
172.16.12.0/24 networks.
WEST(config)# router ospf 1
WEST(config-router)# network 172.16.1.0 0.0.0.255 area 0
WEST(config-router)# network 172.16.12.0 0.0.0.3 area 0
b. Configure OSPF process ID 1 using area 0 on the EAST router for the 172.16.2.0/24 and
172.16.12.0/24 networks.
EAST(config)# router ospf 1
EAST(config-router)# network 172.16.2.0 0.0.0.255 area 0
EAST(config-router)# network 172.16.12.0 0.0.0.3 area 0
b. From the EAST router issue the command to verify the route to 172.16.1.0/24 LAN on
the WEST router. What is the exit interface and IP address to reach the 172.16.1.0/24
network?
Step 3: Verify end-to-end connectivity.
a. Ping from PC-A to PC-C. It should be successful. If not, troubleshoot until you
have end-to-end connectivity.
Note: It may be necessary to disable the PC firewall to ping between PCs.
b. Traceroute from PC-A to PC-C. What is the path from PC-A to PC-C?
Router Interface Summary Table
Router Interface Summary
Note: To find out how the router is configured, look at the interfaces to identify the type of
router and how many interfaces the router has. There is no way to effectively list all the
combinations of configurations for each router class. This table includes identifiers for the
possible combinations of Ethernet and Serial interfaces in the device. The table does not
include any other type of interface, even though a specific router may contain one. An example
of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that
can be used in Cisco IOS commands to represent the interface.
Packet Tracer - Configure VTP and DTP
Topology
What is VTP?
VTP is a Layer 2 messaging protocol that was designed to manage the creation and deletion
of VLANs and maintain network-wide VLAN database consistency. Using this protocol, a
network administrator can add or delete VLANs and have those changes automatically
propagated to all other switches in the network.
Without VTP, switches do not exchange information about VLANs.
The protocol has been designed around the centralized management idea. One or more
switches are assigned the role of VTP Server.
Any updates made on these switches are sent through VTP to the other switches, which are
VTP Clients
What are the modes of VTP in networking?
There are three modes of VTP in networking, namely-
VTP Server Mode
VTP Client Mode
VTP Transparent Mode
en
conf t
hostname s3
int f0/21
switchport mode trunk
exit
vtp domain CCIE
vtp password Cisco123
vtp version 2
vtp mode server
exit
Topology
Addressing Table
Device Interface IP Address Subnet Mask
What is NAT?
Network Address Translation (NAT) is a service that enables private IP networks to use the
internet and cloud.
NAT translates private IP addresses in an internal network to a public IP address before
packets are sent to an external network.
What is Static NAT?
Static NAT (Network Address Translation) - Static NAT (Network Address Translation) is
one-to-one mapping of a private IP address to a public IP address. Static NAT (Network
Address Translation) is useful when a network device inside a private network needs to be
accessible from internet.
What is Dynamic NAT?
Dynamic NAT (Network Address Translation) - Dynamic NAT can be defined as mapping of
a private IP address to a public IP address from a group of public IP addresses called as NAT
pool. Dynamic NAT establishes a one-to-one mapping between a private IP address to a
public IP address. Here the public IP address is taken from the pool of IP addresses
configured on the end NAT router. The public to private mapping may vary based on the
available public IP address in NAT pool.
What is PAT?
PAT (Port Address Translation) - Port Address Translation (PAT) is another type of dynamic
NAT which can map multiple private IP addresses to a single public IP address by using a
technology known as Port Address Translation.
Objectives
Part 1: Build the Network and Configure Basic Device Settings
Part 2: Configure and verify NAT for IPv4
Part 3: Configure and verify PAT for IPv4
Part 4: Configure and verify Static NAT for IPv4
Background / Scenario
Network Address Translation (NAT) is the process where a network device, such as a
Cisco router, assigns a public address to host devices inside a private network. The
main reason to use NAT is to reduce the number of public IP addresses that an
organization uses because the number of available IPv4 public addresses is limited.
An ISP has allocated the public IP address space of 209.165.200.224/29 to a
company. This network is used to address the link between the ISP router (R2) and
the company gateway (R1). The first address (209.165.200.225) is assigned to the
g0/0/0 interface on R2 and the last address (209.165.200.230) is assigned to the
g0/0/0 interface on R1. The remaining addresses (209.165.200.226-209.165.200.229)
will be used to provide internet access to the company hosts. A default route is used
from R1 to R2. The internet is simulated by a loopback address on R2.
In this lab, you will configure various types of NAT. You will test, view, and
verify that the translations are taking place, and you will interpret the NAT/PAT
statistics to monitor the process.
Required Resources
• 2 Routers (Cisco 4221 with Cisco IOS XE Release 16.9.4 universal
image or comparable)
• 2 Switches (Cisco 2960 with Cisco IOS Release 15.2(2) lanbasek9
image or comparable)
• 2 PCs (Windows with a terminal emulation program, such as Tera
Term)
• Console cables to configure the Cisco IOS devices via the console ports
• Ethernet cables as shown in the topology
Instructions
b. From PC-A, ping the Lo1 interface (209.165.200.1) on R2. If the ping was
unsuccessful, troubleshoot and correct the issues. On R1, display the NAT table on
R1 with the command show ip nat translations.
R1
# show ip nat translations
c. Notice that the previous translation for PC-B is still in the table. From S1, ping the
Lo1 interface (209.165.200.1) on R2.
If the ping was unsuccessful, troubleshoot and correct the issues. On R1, display the
NAT table on R1 with the command show ip nat translations.
R1# show ip nat translations
d. Now try and ping R2 Lo1 from S2. This time, the translations fail, and you get these
messages (or similar) on the R1 console:
e. This is an expected result, because only 3 addresses are allocated, and we tried to
ping Lo1 from four devices. Recall that NAT is a one-to-one translation. So how
long are the translations allocated? Issue the command show ip nat translations
verbose and you will see that the answer is for 24 hours.
R1# show ip nat translations verbose
f. Given that the pool is limited to three addresses, NAT to a pool of addresses is
not adequate for our application. Clear the NAT translations and statistics and
we will move on to PAT.
R1# clear ip nat translations
b. Generate traffic from multiple devices to observe PAT. On PC-A and PC-B, use the -t
parameter with the ping command to send a non-stop ping to R2’s Lo1 interface
(ping -t 209.165.200.1). On S1 and S2, issue the privileged exec command ping
209.165.200.1 repeat 2000. Then go back to R1 and issue the show ip nat
translations command.
R1# show ip nat translations
Part 4: Configure and verify Static NAT for IPv4
In Part 4, you will configure static NAT so that PC-A is directly reachable from
the internet. PC-A will be reachable from R2 via the address 209.165.200.229.
.
Step 2: On R1, configure the NAT command required to statically map an inside
address to an outside address.
For this step, configure a static mapping between 192.168.1.11 and
209.165.200.1 using the following command:
R1(config)# ip nat inside source static 192.168.1.2 209.165.200.229
Note: you may have to disable the PC firewall for the pings to work.
c. On R1, display the NAT table on R1 with the command show ip nat translations,
and you should see the static mapping and the port-level translation for the
inbound pings.
R1# show ip nat translations
This validates that the Static NAT is working.
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 Serial 0/0/1
(F0/0) (F0/1) (S0/0/0) (S0/0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 Serial 0/1/1
(F0/0) (F0/1) (S0/1/0) (S0/1/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 Serial 0/0/1
(F0/0) (F0/1) (S0/0/0) (S0/0/1)
Objectives:
Step 1: Build the Network and Configure Basic Device Settings
Step 2: Create VLANs and Assign Switch Ports
Step 3: Configure an 802.1Q Trunk between the Switches
Step 4: Configure Inter-VLAN Routing on the Router
Step 5: Verify Inter-VLAN Routing is working
Show VLAN
Show Trunk